General

  • Target

    0f9a82bd99cf08ec695e5994cee1654dcd5a910f438e9d8efa03043a1a87f65e

  • Size

    99KB

  • Sample

    220212-hb7aeaafgn

  • MD5

    121e7f85c6dc9e161b9d9338fbad2bd6

  • SHA1

    4e9de100a4df156fb8feb8e7d43b379e849e2d32

  • SHA256

    0f9a82bd99cf08ec695e5994cee1654dcd5a910f438e9d8efa03043a1a87f65e

  • SHA512

    9c6289e561a0ca4815d966c3003d38ef6c28cb330d5d38c5717f19326a0a4aa3745d1d68c17477030e5c363c3bc632bf431d32cde1747556026a91881025621b

Malware Config

Targets

    • Target

      0f9a82bd99cf08ec695e5994cee1654dcd5a910f438e9d8efa03043a1a87f65e

    • Size

      99KB

    • MD5

      121e7f85c6dc9e161b9d9338fbad2bd6

    • SHA1

      4e9de100a4df156fb8feb8e7d43b379e849e2d32

    • SHA256

      0f9a82bd99cf08ec695e5994cee1654dcd5a910f438e9d8efa03043a1a87f65e

    • SHA512

      9c6289e561a0ca4815d966c3003d38ef6c28cb330d5d38c5717f19326a0a4aa3745d1d68c17477030e5c363c3bc632bf431d32cde1747556026a91881025621b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks